The SANS Institute says: Mobile devices are more than just small computers in continuous use with perpetual connections to the Internet. The operating paradigm of these devices calls for new approaches to help ensure the data processed by them remains secure while maintaining productivity.

Symantec Endpoint Protection Mobile’s risk-based mobile security approach is designed from the ground up to defend against all detected threats that put business data at risk of exposure, theft and manipulation, while respecting users’ need for privacy, productivity and a great mobile experience.

Holistic, Layered Mobile Security

Underlying the alerts and protective actions of the Symantec Endpoint Protection Mobile app and cloud-based server is currently the most advanced mobile security technology available today. While many mobile security providers focus on a single threat vector, or a single layer of analysis, Endpoint Protection Mobile researchers know that the best way to protect mobile devices is to think like hackers and build a multi-layered system to simultaneously protect against every mobile threat vector from the ground up.

The SANS Institute has identified the four mobile threat vectors that a comprehensive solution must be protected against:

Physical attacks

Vulnerability exploits

Malicious apps

Network attacks

Automated Protection, Not Just Detection

Most Mobile Threat Defense solutions are passive tools that send notifications on detecting suspicious activity, and must rely on third-party solutions, like EMM, to take any action to protect corporate data. This is often too little and too late.

Symantec Endpoint Protection Mobile responds in real time to many identified threats taking deliberate actions and leveraging machine learning to protect devices and the resources they connect to.

Here are just a few of the many active protections that keep mobile devices, and all of the sensitive information they may have access to, safe:

Protect sensitive corporate resources

Help block installation of malicious apps

End detected malicious processes

Help prevent access to corporate Wi-Fi from compromised devices

Help block communication to known malicious command and control servers